scholarly journals Suggested Integral Analysis for Chaos-Based Image Cryptosystems

Entropy ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. 815 ◽  
Author(s):  
Miguel Angel Murillo-Escobar ◽  
Manuel Omar Meranza-Castillón ◽  
Rosa Martha López-Gutiérrez ◽  
César Cruz-Hernández

Currently, chaos-based cryptosystems are being proposed in the literature to provide confidentiality for digital images, since the diffusion effect in the Advance Encryption Standard (AES) algorithm is weak. Security is the most important challenge to assess in cryptosystems according to the National Institute of Standard and Technology (NIST), then cost and performance, and finally algorithm and implementation. Recent chaos-based image encryption algorithms present basic security analysis, which could make them insecure for some applications. In this paper, we suggest an integral analysis framework related to comprehensive security analysis, cost and performance, and the algorithm and implementation for chaos-based image cryptosystems. The proposed guideline based on 20 analysis points can assist new cryptographic designers to present an integral analysis of new algorithms. Future comparisons of new schemes can be more consistent in terms of security and efficiency. In addition, we present aspects regarding digital chaos implementation, chaos validation, and key definition to improve the security of the overall cryptosystem. The suggested guideline does not guarantee security, and it does not intend to limit the liberty to implement new analysis. However, it provides for the first time in the literature a solid basis about integral analysis for chaos-based image cryptosystems as an effective approach to improve security.

Vehicular Ad-hoc network a subclass of Mobile Ad-hoc network with various features providing Vehicle-to-Vehicle communication, Vehicle-to-RSU communication, Vehicle-to-Trusted Authority Communication. VANET is gaining higher attention now days both in industry and academic area and has become a trending research topic for research but still a lot of improvements is required in this area. Security of data is one of the major challenge in VANET. Encryption of data with the help of various encryption algorithms came up as solution for securing communication in VANET. But existing encryption algorithms used to secure VANET’s are complex due to which data are not delivered on time and face a lot of problems like privacy of data ,non-repudiation and cost (i.e. communication cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e. Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm. The objective of this hybrid approach is to perform double encryption on personal details for more privacy of personal data (using ECC and AES algorithm) and single encryption on safety messages (using AES algorithm) so safety messages are delivered on time and without any delay.


Author(s):  
N. Yakovchuk

The chamber-instrumental ensemble music in the Ukrainian musical culture of the last third of the 20th and the beginning of the 21st centuries occupies one of the leading places and is characterized by powerful processes in its development. Such circumstances caused the Ukrainian musicologist interests to the problems of chamber-instrumental music creativity and performance. There are appeared researches in the field of theory, history and performance problems covering the most important questions like chamber music definitions, specific genre issues, the growing function of piano in the Ukrainian chamber music, the increasing questions of technique and timbre importance of modern instrumental ensembles. In the significant multifaceted creative work of contemporary Ukrainian composer, Oleksandr Yakovchuk, the genre of chamber instrumental ensemble music represents a complex and interesting phenomenon. Original and skillfully written compositions reflect artistic world of the composer of postmodern time and gained recognition in music life of Ukraine and beyond. These works are highly appreciated in performing practice of our days. The purpose of the article is to analyze the work — “Little Trio” for clarinet, bassoon and piano (1980), which has the signs of neoclassical tendency in the composer’s style. The methodological basis of this research is a comprehensive approach in theoretical understanding of the subject of research (the methods of textology, source study as well as the method of interviewing the author were used). The scientific novelty of this article is in the priority of its main provisions, since the “Little Trio” entered the scientific circulation for the first time. The three-movement “Little Trio” (1980) is notable for the light feeling of timbre colours and the shape clarity. The Ist movement — Allegretto giocoso — is written in a sonata form following all classical traditions. Quite interesting are the two monologues of clarinet and bassoon from the IInd movement, they represent very modern line in Ukrainian chamber music — the possibility of sincere confession which comes through the solo cadence. In the IIIrd movement, the composer took advantage from the folk Ukrainian dance “hopak” using the rhythm of it and creating dance character of the Final.


2015 ◽  
Vol 31 (3) ◽  
pp. 291-300 ◽  
Author(s):  
Dennis M. Bline ◽  
Stephen Perreault ◽  
Xiaochuan Zheng

ABSTRACT While many colleges and universities publicize CPA examination pass rates as evidence of having a high-quality accounting program, some have questioned whether program-specific characteristics are legitimate predictors of examination success. To examine this issue, we empirically investigate the link between accounting faculty characteristics and performance on the CPA examination. We examine the results from nearly 700,000 first-time exam sittings taken during the period 2005–2013 and find that faculty research and teaching specialization has a significant impact on CPA exam performance. That is, when a program has a relatively higher percentage of accounting faculty with expertise in a particular content area tested on the exam (e.g., auditing), graduates achieve higher scores on the related exam section (e.g., AUD). We also find that faculty research productivity and CPA certification status are positively related to candidate exam performance. We believe these results contribute to the existing literature on the determinants of CPA exam success and also provide important insights to those responsible for accounting faculty staffing and development.


2021 ◽  
pp. 100004
Author(s):  
Zheng Fang ◽  
Hao Fu ◽  
Tianbo Gu ◽  
Zhiyun Qian ◽  
Trent Jaeger ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-12
Author(s):  
Wenqi Chen ◽  
Hui Tian ◽  
Chin-Chen Chang ◽  
Fulin Nan ◽  
Jing Lu

Cloud storage, one of the core services of cloud computing, provides an effective way to solve the problems of storage and management caused by high-speed data growth. Thus, a growing number of organizations and individuals tend to store their data in the cloud. However, due to the separation of data ownership and management, it is difficult for users to check the integrity of data in the traditional way. Therefore, many researchers focus on developing several protocols, which can remotely check the integrity of data in the cloud. In this paper, we propose a novel public auditing protocol based on the adjacency-hash table, where dynamic auditing and data updating are more efficient than those of the state of the arts. Moreover, with such an authentication structure, computation and communication costs can be reduced effectively. The security analysis and performance evaluation based on comprehensive experiments demonstrate that our protocol can achieve all the desired properties and outperform the state-of-the-art ones in computing overheads for updating and verification.


2016 ◽  
Vol 11 (7) ◽  
pp. 1500-1514 ◽  
Author(s):  
Nicholas Kolokotronis ◽  
Alexandros Katsiotis ◽  
Nicholas Kalouptsidis

2016 ◽  
Vol 125 (5) ◽  
pp. 1046-1055 ◽  
Author(s):  
Huaping Sun ◽  
Yan Zhou ◽  
Deborah J. Culley ◽  
Cynthia A. Lien ◽  
Ann E. Harman ◽  
...  

Abstract Background As part of the Maintenance of Certification in Anesthesiology Program® (MOCA®), the American Board of Anesthesiology (Raleigh, North Carolina) developed the MOCA Minute program, a web-based intensive longitudinal assessment involving weekly questions with immediate feedback and links to learning resources. This observational study tested the hypothesis that individuals who participate in the MOCA Minute program perform better on the MOCA Cognitive Examination (CE) compared with those who do not participate. Methods Two separate cohorts of individuals eligible for July 2014 and January 2015 CEs were invited to participate in this pilot. The CE scores for each cohort were compared between those who did and did not participate, controlling for the factors known to affect performance. For the first cohort, examination performances for topics covered and not covered by the MOCA Minute were analyzed separately. Results Six hundred sixteen diplomates in July 2014 and 684 diplomates in January 2015 took the CE for the first time. In multiple regression analysis, those actively participating scored 9.9 points (95% CI, 0.8 to 18.9) and 9.3 points (95% CI, 2.3 to 16.3) higher when compared with those not enrolled, respectively. Compared to the group that did not enroll in MOCA Minute, those who enrolled but did not actively participate demonstrated no improvement in scores. MOCA Minute participation was associated with improvement in both questions covering topics included the MOCA Minute and questions not covering these topics. Conclusions This analysis provides evidence that voluntary active participation in a program featuring frequent knowledge assessments accompanied by targeted learning resources is associated with improved performance on a high-stakes CE.


2021 ◽  
Author(s):  
Yilin Yuan ◽  
Jianbiao Zhang ◽  
Wanshan Xu ◽  
Xiao Wang ◽  
Yanhui Liu

Abstract Under the shared big data environment, most of the existing data auditing schemes rarely consider the authorization management of group users. Meanwhile, how to deal with the shared data integrity is a problem that needs to be pondered. Thus, in this paper, we propose a novel remote data checking possession scheme which achieves group authority management while completing the public auditing. To perform authority management work, we introduce a trusted entity – group manager. We formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide two versions of AIA scheme: basic AIA scheme and standard AIA scheme. The standard AIA scheme is constructed based on the basic AIA scheme and user information table (UIT), with advanced security and wider applicable scenarios. By virtue of standard AIA scheme, the group manager can perfectly and easily carry out authority management, including enrolling, revoking, updating. On the basis of the above, we further design a public auditing scheme for non-revoked users’ shared data. The scheme is based on identity-based encryption (IBE), which greatly reduce the necessary certificate management cost. Furthermore, the detailed security analysis and performance evaluation demonstrate that the scheme is safe and feasible.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qingqing Xie ◽  
Fan Dong ◽  
Xia Feng

The blockchain technology achieves security by sacrificing prohibitive storage and computation resources. However, in mobile systems, the mobile devices usually offer weak computation and storage resources. It prohibits the wide application of the blockchain technology. Edge computing appears with strong resources and inherent decentralization, which can provide a natural solution to overcoming the resource-insufficiency problem. However, applying edge computing directly can only relieve some storage and computation pressure. There are some other open problems, such as improving confirmation latency, throughput, and regulation. To this end, we propose an edge-computing-based lightweight blockchain framework (ECLB) for mobile systems. This paper introduces a novel set of ledger structures and designs a transaction consensus protocol to achieve superior performance. Moreover, considering the permissioned blockchain setting, we specifically utilize some cryptographic methods to design a pluggable transaction regulation module. Finally, our security analysis and performance evaluation show that ECLB can retain the security of Bitcoin-like blockchain and better performance of ledger storage cost in mobile devices, block mining computation cost, throughput, transaction confirmation latency, and transaction regulation cost.


Sign in / Sign up

Export Citation Format

Share Document